ABOUT THE BOOK"Cyber crime, Security, and Artificial Intelligence" delves into the intricate intersection of technology, crime, and the evolving landscape of artificial intelligenc..
ABOUT THE BOOKThis book advances theoretically informed realist criminology of computer crime. Looking beyond current strategies of online crime control, this book argues for a new..
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future busi..
Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep ..
In this book the author has made an endeavor to study crime in the context of Female Criminality, Child Sexual Abuse and Juvenile Delinuency. Crimeless society is a mth and is unco..
ABOUT THE BOOKThe socio-legal tussle surrounding cybercrime is a complex and evolving challenge that spans both national and international domains. At the national level, governmen..
ABOUT THE BOOKIn the rapidly evolving landscape of online banking, where technology has transformed the way customers manage their finances, the book "Cyber security Threats in Onl..
ABOUT THE BOOKOur primary objective is to provide a trustworthy source for presenting a balanced perspective in the field of criminology without circumventing the d..
ABOUT THE BOOKDue to advancement of technology, growth of the economy and market, there has been a transition of business from physical space to cyber space. The citizens are now p..
ABOUT THEBOOKCyber Crimes: Issues, Policy, Regulation, and Development offer the reader a detailed reading on core aspects of cyber law and cybercrime. The book covers a diverse a..
ABOUT THE BOOKThis book argues that the expressivist justice model provides a meaningful foundation for the participation of victims in international criminal proceedings.Tradition..
ABOUT THE BOOKSolid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. New software..
ABOUT THE BOOKIn this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of t..
This book presents the latest and most relevant studies, surveys, and succinct reviews in the field of financial crimes and cyber crime, conducted and gathered by a group of top pr..
This Element aims to achieve three objectives. First, it explores some key institutional characteristics of several Asian economies that are relevant to corporate governance practi..
This book is dedicated to the millions of fellow human beings-countable though not counted- Who have suffered, by losing their dear ones to violence, hunger and lack of healt..
ABOUT THE BOOKRight to privacy the individual rights against the surveillance power of the government. Right to privacy is a part of rule of law that limits the governmental action..
This book follows the history of the international law of
peace and armed conflict over the last 25 years. It highlights both the
parameters that have remained the same over the ..
The Prime objective of the book was to call for papers from various authors and include their ideas while consolidating the same into a Book. Apart from this, the book has been e..
ABOUT THE BOOKIn his book, philosopher and law professor Ken Levy explains why he agrees with most people, but not with most other philosophers, about free will and responsibility...
Golak Prasad Sahoo is an Associate Professor of Law, Banaras Hindu University,
Varanasi. Completing LL.B. and LL.M. from Utkal University, Odisha, he joined
as an assistant ..
Appointment of judges and its process is the most vital aspect of the independence of judiciary, also a basic feature of the Constitution of India. Our Constitution enshrines vario..